alphaSeclab / sec-daily-2020
2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总
☆41Updated 4 years ago
Alternatives and similar repositories for sec-daily-2020
Users that are interested in sec-daily-2020 are comparing it to the libraries listed below
Sorting:
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆25Updated 6 years ago
- CVE-2020-17008 splWOW64 Elevation of Privilege☆48Updated 4 years ago
- ☆57Updated 6 years ago
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Updated 5 years ago
- Volatility Linux Profiles☆27Updated 10 years ago
- A simple script for quickly mining sensitive information in binary files.☆29Updated 4 years ago
- 感染PE文件的病毒学习过程☆31Updated 4 years ago
- ☆24Updated 5 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago
- Knowledge Base 慢雾安全团队知识库☆29Updated 5 years ago
- ☆32Updated 4 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆78Updated 6 years ago
- Pull some collected APT group related samples, ransomware, remote control and other malicious programs for security researchers to use.☆44Updated 5 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆32Updated 4 years ago
- CVE-2020–14882 by Jang☆29Updated 4 years ago
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆28Updated 4 years ago
- Some scripts for penetration testing☆30Updated 6 years ago
- DNSLog 是一款监控 DNS 解析记录和 HTTP 访问记录的工具。☆45Updated 4 years ago
- Papers☆34Updated 5 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆30Updated 4 years ago
- A simple xss bot template☆23Updated 4 years ago
- Security Research☆36Updated 3 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 4 years ago
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Updated 5 years ago
- ☆30Updated 5 years ago
- Dependencies with Log4j2 Checklist☆35Updated 3 years ago
- ☆80Updated 4 years ago
- Local penetration test experimental environment☆33Updated 5 years ago